
๐ฅ CVE-2025-54309 โ CrushFTP Unauthenticated Remote Command Execution Exploit PoC by Issam Junior ๐จ Vulnerability Overview CVE: CVE-2025-54309 CVSS: 9.8 (Critical) Product: CrushFTP Impact: Unauthenticated Remote Command Execution (RCE) over HTTPS CrushFTP, a popular enterprise file transfer solution, suffers from a critical vulnerability in its DMZ proxy implementation. Missing checks allow external attackers to reach the admin interface via HTTPS POST requests, bypassing authentication and directly invoking system commands. Technical Breakdown The vulnerability exists due to an incomplete validation in the DMZ proxy's handling of HTTPS requests. By crafting a malicious XML-RPC request to the /WebInterface/function/ endpoint, attackers can trigger system commands on the server without authentication. This flaw allows full server compromise, data theft, and lateral movement. Affected Versions: All CrushFTP versions prior to 10.7.0 (verify with vendor advisories for specifics). ๐ต๏ธโโ๏ธ Dorks for Hunting CrushFTP Servers ๐ Shodan Dorks http.favicon.hash:427298725 "CrushFTP" http.html:"CrushFTP" product:"CrushFTP" ssl:"CrushFTP" port:443 "CrushFTP" ๐ฆ Ffuf/Faff Dorks (URL Discovery) /WebInterface/function/ /WebInterface/login/ /WebInterface/json/ /WebInterface/info/ /favicon.ico ๐ท๏ธ Hunter Dorks (Google, Censys, etc.) title:"CrushFTP WebInterface" "Powered by CrushFTP" inurl:/WebInterface/function/ inurl:/WebInterface/login/ โก Exploit Features Multiple Payloads: xml:โฆRead More
Exploit for Unprotected Alternate Channel in Crushftp

